Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Unknown | Fusion Builder | 3.6.2 ~ 3.6.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/ardzz/CVE-2022-1386 | POC Details |
| 2 | Automatic Mass Tool for checking vulnerability in CVE-2022-1386 - Fusion Builder < 3.6.2 - Unauthenticated SSRF | https://github.com/im-hanzou/fubucker | POC Details |
| 3 | None | https://github.com/zycoder0day/CVE-2022-1386-Mass_Vulnerability | POC Details |
| 4 | None | https://github.com/imhunterand/CVE-2022-1386 | POC Details |
| 5 | None | https://github.com/satyasai1460/CVE-2022-1386 | POC Details |
| 6 | Fusion Builder < 3.6.2 - Unauthenticated SSRF | https://github.com/lamcodeofpwnosec/CVE-2022-1386 | POC Details |
| 7 | WordPress Fusion Builder plugin before 3.6.2 is susceptible to server-side request forgery. The plugin does not validate a parameter in its forms, which can be used to initiate arbitrary HTTP requests. The data returned is then reflected back in the application's response. An attacker can potentially interact with hosts on the server's local network, bypass firewalls, and access control measures. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-1386.yaml | POC Details |
| 8 | Fusion Builder < 3.6.2 - Unauthenticated SSRF | https://github.com/cur1y-dev/CVE-2022-1386 | POC Details |
| 9 | Unauthenticated SSRF PoC in WordPress Fusion Builder <3.6.2 (CVE-2022-1386) | https://github.com/fayassgit/CVE-2022-1386-FusionBuilder-SSRF | POC Details |
| 10 | Fusion Builder < 3.6.2 - Unauthenticated SSRF | https://github.com/ptrgits/CVE-2022-1386 | POC Details |
| 11 | Fusion Builder < 3.6.2 - Unauthenticated SSRF | https://github.com/kreeksec/CVE-2022-1386 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet